Get my own profile
Public access
View all39 articles
8 articles
available
not available
Based on funding mandates
Co-authors
- Guenther RuheProfessor of Computer Science, Electrical and Software Engineering, University of CalgaryVerified email at ucalgary.ca
- Dietmar PfahlUniversity of Tartu, EstoniaVerified email at ut.ee
- Walid MaalejUniversity of HamburgVerified email at informatik.uni-hamburg.de
- Bram AdamsQueen's UniversityVerified email at queensu.ca
- Henry ChoEngineering Science, University of TorontoVerified email at mail.utoronto.ca
- Thomas ZimmermannSr. Principal Researcher at Microsoft Research, RedmondVerified email at microsoft.com
- Timo JohannDigital Transformation Manager at Es-geht-Energiesysteme GmbHVerified email at informatik.uni-hamburg.de
- Andreas ZellerFaculty, CISPA Helmholtz Center for Information Security • Professor, Saarland UniversityVerified email at cispa.de
- Jane Huffman HayesUniversity of KentuckyVerified email at cs.uky.edu
- Frank MaurerUniversity of CalgaryVerified email at ucalgary.ca
- mahshid marboutiUniversity Of Calgary, Calgary, AlbertaVerified email at ucalgary.ca
- Rick KazmanProfessor, University of HawaiiVerified email at hawaii.edu
- Kelly LyonsFaculty of Information, University of TorontoVerified email at utoronto.ca
- Alex DekhtyarProfessor, Department of Computer Science, Cal PolyVerified email at calpoly.edu
- Christof EbertVectorVerified email at ieee.org
- Giuliano (Giulio) AntoniolRetired -- Former Professor at DGIGL -- Polytechnique MontréalVerified email at polymtl.ca
- Yuanfang CaiProfessor of Computer Science, Drexel UniversityVerified email at cs.drexel.edu
- Alessio FerrariResearch Scientist, ISTI CNRVerified email at isti.cnr.it
- Muhammad Rezaul Karim, PhDUniversity of CalgaryVerified email at alumni.ucalgary.ca
- Paul ChenSoftware Engineering, University of CalgaryVerified email at ucalgary.ca